[ot] machine independent protection from stack-smashing attack (fwd)

From: ADAM Sulmicki (adam@cfar.umd.edu)
Date: Thu Aug 10 2000 - 13:11:01 EST


Not quite related to kernel development per see, but I though,
nevertheless it would be of interest to many folks here.

-- 
Adam
http://www.eax.com	The Supreme Headquarters of the 32 bit registers

---------- Forwarded message ---------- Date: Wed, 9 Aug 2000 18:59:49 +0900 From: Hiroaki Etoh <ETOH@JP.IBM.COM> To: BUGTRAQ@SECURITYFOCUS.COM Subject: machine independent protection from stack-smashing attack

I have been investigating a machine-independent change to GCC that would generate code to protect applications from stack-smashing attacks. The main characteristics are low performance overhead of the protection code, protecting against different varieties of stack-smashing attacks, and supporting various processors. A research report is ready on the web (http://www.trl.ibm.co.jp/projects/security/propolice).

I would like some feedback whether it is worth pursuing getting it assigned to the FSF for inclusion in GCC.

--- Hiroaki Etoh, Tokyo Research Laboratory, IBM Japan

- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.tux.org/lkml/



This archive was generated by hypermail 2b29 : Tue Aug 15 2000 - 21:00:22 EST